• Title/Summary/Keyword: Dual Security

Search Result 147, Processing Time 0.027 seconds

Design of Hardware(Hacker Board) for IoT Security Education Utilizing Dual MCUs (이중 MCU를 활용한 IoT 보안 교육용 하드웨어(해커보드) 설계)

  • Dong-Won Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.43-49
    • /
    • 2024
  • The convergence of education and technology has been emphasized, leading to the application of educational technology (EdTech) in the field of education. EdTech provides learner-centered, customized learning environments through various media and learning situations. In this paper, we designed hardware for EdTech-based educational tools for IoT security education in the field of cybersecurity education. The hardware is based on a dual microcontroller unit (MCU) within a single board, allowing for both attack and defense to be performed. To leverage various sensors in the Internet of Things (IoT), the hardware is modularly designed. From an educational perspective, utilizing EdTech in cybersecurity education enhances engagement by incorporating tangible physical teaching aids. The proposed research suggests that the design of IoT security education hardware can serve as a reference for simplifying the creation of a security education environment for embedded hardware, software, sensor networks, and other areas that are challenging to address in traditional education..

Nationality Deprivation of Double Nationals in France and Securitization (프랑스 이중국적자의 국적박탈 논쟁과 안보화 (securitization))

  • Park, Sunhee
    • Journal of International Area Studies (JIAS)
    • /
    • v.22 no.1
    • /
    • pp.67-90
    • /
    • 2018
  • France has allowed a deprivation of nationality for terrorism since 1996 Law. After then, a series of law revision (1998, 2006 law and 2010, 2015-2015 reform tries) have not only linked an act of terror with nationality deprivation but also put the dual national and their deprivation at the centre of dispute. Both 2010 Immigration Law by Sarkozy and 2015-2016 constitutional amendment by Hollande had been not adopted but have combined immigrants and security issue together by firmly solidifying the relationship between dual national and terrorist. Especially in 2015-2016, the constitutional amendment that failed to be adopted has extended a state of emergency and left the nationality deprivation of dual national as controversial issue. After over 4 months of discussion, the amendment that contains a clause of a state of emergency and extension plan for nationality deprivation was abolished but the dual national issues which had been non-politicized has now become politicized, defined as security issues and finally securitized. It shows very two-stage process of securitization argued by Copenhagen school including Buzan. The importance of securitization notion by Copenhagen school lies on the fact that it scrutinizes the constructive elements of the process of securitization. The concept of securitization allows us to see the problem of the process that defines a non-politicized issue as security one by making it political matter. Applying this process of securitization into the controversy of nationality deprivation of dual nationals in France, we can find out the development of non-controversial and non-politicized dual national issues into social agenda by politicization through speech-act or announcement effect.

ON DUALITY OF WEIGHTED BLOCH SPACES IN ℂn

  • Yang, Gye Tak;Choi, Ki Seong
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.23 no.3
    • /
    • pp.523-534
    • /
    • 2010
  • In this paper, we consider the weighted Bloch spaces ${\mathcal{B}}_q$(q > 0) on the open unit ball in ${\mathbb{C}}^n$. We prove a certain integral representation theorem that is used to determine the degree of growth of the functions in the space ${\mathcal{B}}_q$ for q > 0. This means that for each q > 0, the Banach dual of $L_a^1$ is ${\mathcal{B}}_q$ and the Banach dual of ${\mathcal{B}}_{q,0}$ is $L_a^1$ for each $q{\geq}1$.

A Novel Watermarking using Cellular Automata Transform (셀룰러 오토마타 변환을 이용한 새로운 워터마킹)

  • Piao, Yong-Ri;Kim, Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.155-158
    • /
    • 2008
  • In this paper, we propose a novel blind watermarking Method using 2D CAT (Two dimensional cellular automata transform). In our scheme, firstly, we obtain the gateway values to generate a dual-state, dual-coefficients basis function. Secondly, the basis function transforms images into cellular automata space. Lastly, we use the cellular automata transform coefficients to embed random noise watermark in the cover images. The proposed scheme allows only one 2D CAT basis function per gateway value. Since there are $2^{96}$ possible gateway values, better security is guaranteed. Moreover, the new method not only verifies higher fidelity than the existing method but also stronger stability on JPEG lossy compression, filtering, sharpening and noise through tests for robustness.

  • PDF

Optical System Implementation of OFB Block Encryption Algorithm (OFB 블록 암호화 알고리즘의 광학적 시스템 구현)

  • Gil, Sang-Keun
    • Journal of IKEEE
    • /
    • v.18 no.3
    • /
    • pp.328-334
    • /
    • 2014
  • This paper proposes an optical encryption and decryption system for OFB(Output Feedback Block) encryption algorithm. The proposed scheme uses a dual-encoding technique in order to implement optical XOR logic operation. Also, the proposed method provides more enhanced security strength than the conventional electronic OFB method due to the huge security key with 2-dimensional array. Finally, computer simulation results of encryption and decryption are shown to verify the proposed method, and hence the proposed method makes it possible to implement more effective and stronger optical block encryption system with high-speed performance and the benefits of parallelism.

Study On Integrating Internet and Intranet based on IPSec and IMA Technology (IPSec과 IMA를 이용한 인터넷과 내부 망 통합에 관한 연구)

  • Cho, Yong-Gun
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.71-78
    • /
    • 2008
  • This research is on the study of integrating internet and intranet that was built for their own enterprise into one network system that promises a more economic and secure use. Compared to this system, the traditional network conversion device not only has its mechanical limits, but also requires a separate network set up. This raises both interoperability and security problems and results in a higher cost. Therefore, I propose dual defence system based on the inverse multiplexing of ATM Forum and IPSec to improve network ability and deliver enhanced system reliability while reducing cost. Furthermore, I also addressed some of the weaknesses of the Scanning Attacking Method, SNMP and Spooler Port and proposed counter measures that will deal with these weakness at the dual defence system.

  • PDF

Concealed Policy and Ciphertext Cryptography of Attributes with Keyword Searching for Searching and Filtering Encrypted Cloud Email

  • Alhumaidi, Hind;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.212-222
    • /
    • 2022
  • There has been a rapid increase in the use of cloud email services. As a result, email encryption has become more commonplace as concerns about cloud privacy and security grow. Nevertheless, this increase in usage is creating the challenge of how to effectively be searching and filtering the encrypted emails. They are popular technologies of solving the issue of the encrypted emails searching through searchable public key encryption. However, the problem of encrypted email filtering remains to be solved. As a new approach to finding and filtering encrypted emails in the cloud, we propose a ciphertext-based encrypted policy attribute-based encryption scheme and keyword search procedure based on hidden policy ciphertext. This feature allows the user of searching using some encrypted emails keywords in the cloud as well as allowing the emails filter-based server toward filter the content of the encrypted emails, similar to the traditional email keyword filtering service. By utilizing composite order bilinear groups, a hidden policy system has been successfully demonstrated to be secure by our dual system encryption process. Proposed system can be used with other scenarios such as searching and filtering files as an applicable method.

A Study on Developing Qualification Criteria in the Private Security Industry (민간경비 자격검정 개선방안에 관한 연구)

  • Choe, Jung-Taek
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.143-167
    • /
    • 2009
  • As of entering the 21st century, a trend in the field of a private security industry among the advanced countries have been increased a qualification system and train session to meet the needs of professionalism. Intensifying the professionalism in Korea, education and train system has been initiated to change but the oligopoly market already formulated due to impractical selection standard and management of education system. Issuing certification and offering basic training through a designated institution for the purpose of improving quality of the private security industry worker, its practical effectiveness were lower than expectation. Rather certification-holder or security agency, institution or truster's rent-seeking behavior have been increased by occupational licensing system. The founded results, which were associated to problems in selecting and educating to the private security guard, in this study were that any verification has been initiated towards dual-system in official approval and structural problems in education system, and non-existence of verification for professionalism and management capability to security agency owner and its upper managerial level. Current a dual system in an officially authorized verification system and completion of security guard credential requested change to an unified official qualification verification system to solve those problems. Ranges of an applicant to the unified official qualification verification system should be extend to the whole population in the private security industry. Moreover, minimization of the dead-weigh loss, which is caused by oligopoly phenomenon while using its market-dominant status, increasement number of designated institution, which allows self-regulating competition, and endowment of autonomy, which is in selecting education and agency, were requested to solve the problems in selecting and educating to the private security guard. In order to minimize stated problems while maintaining objectiveness, a new manage and supervise institution, which is called a 'private security industry committee', should be establish. The private security industry committee is a formation of governance network which are participated from professional group to civil organization.

  • PDF

Study for Balanced Encoding Method against Side Channel Analysis (부채널 분석에 안전한 밸런스 인코딩 기법에 관한 연구)

  • Yoon, JinYeong;Kim, HanBit;Kim, HeeSeok;Hong, SeokHie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1443-1454
    • /
    • 2016
  • Balanced encoding method that implement Dual-rail logic style based on hardware technique to software is efficient countermeasure against side-channel analysis without additional memory. Since balanced encoding keep Hamming weight and/or Hamming distance of intermediate values constantly, using this method can be effective as countermeasure against side channel analysis due to elimination of intermediate values having HW and/or HD relating to secret key. However, former studies were presented for Constant XOR operation, which can only be applied to crypto algorithm that can be constructed XOR operation, such as PRINCE. Therefore, our first proposal of new Constant ADD, Shift operations can be applied to various symmetric crypto algorithms based on ARX. Moreover, we did not used look-up table to obtain efficiency in memory usage. Also, we confirmed security of proposed Constant operations with Mutual Information Analysis.

The Effect of Private Guards' Job Embeddedness on Dual Commitment (민간경비원의 직무착근도가 이중몰입에 미치는 영향)

  • Lim, Woon-Sik
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.123-151
    • /
    • 2014
  • The purpose of this study was focused on the relationship between private guards' job embeddedness and dual commitment. In this study, job embeddedness is selected as an independent variable and dual commitment is selected as a dependent variable one. job embeddedness was divided into three sub-factors such as "fit", "links", and "sacrifice", and dual commitment is again composed with organizational commitment, and career commitment. Moreover sex, age, academic background, service period, and income were selected as a control variable. To test the hypotheses, survey data from private guards in Kyungpook are collected and analyzed. Principal component method is used to see which items cluster together in each factor and to calculate factor scores. Multiple regression analysis identifies several factors which have significant effects on dual commitment. Key finding can be summarized as follow. Fist, the factor of "fit" have significant effects on organizational commitment, and career commitment. Second, the factor of "links" have significant effects on organizational commitment, and career commitment. Third the factor of "sacrifice" have significant effects on organizational commitment, and career commitment. Finally, when all the variables with significant effects are included in the final model, "links" disappear, while "fit" and "sacrifice" remain statistically significant. Based on these finding, this study suggests some policy issues to promote private guards' dual commitment.

  • PDF